Name | CVE-2006-0635 |
Description | Tiny C Compiler (TCC) 0.9.23 (aka TinyCC) evaluates the "i>sizeof(int)" expression to false when i equals -1, which might introduce integer overflow vulnerabilities into applications that could be exploited by context-dependent attackers. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 352202 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tcc (PTS) | jessie | 0.9.27~git20140923.9d7fb33-3 | fixed |
| stretch | 0.9.27~git20161217.cd9514ab-3 | fixed |
| buster | 0.9.27-8 | fixed |
| bullseye, bookworm | 0.9.27+git20200814.62c30a4a-1 | fixed |
| sid, trixie | 0.9.27+git20200814.62c30a4a-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tcc | source | (unstable) | 0.9.24~cvs20070502-1 | low | | 352202 |
Notes
[sarge] - tcc <no-dsa> (Only incorrect code gen, hardly any production use)
[etch] - tcc <no-dsa> (Documented as insecure; only incorrect code gen, hardly any production use)